Below are 3 different screen shots of WRTA's website homepage taken on three different dates during the period in which WRTA's domain name and website had been stolen (see dates in image below).
The screens shots are provided by DomainTools.com. You too can search and view original screen shots history by doing the following:
1) Go to http://www.domaintools.com/
2) Enter WRTA's domain religioustravelassociation.com/
3) Click on "Research"
4) Then click on "Screenshot history" (it's under "Research").
The 3 different screen shots below represent the following actions taken by those who committed theft of WRTA's domain name:
1) Screen shot on Sep 22, 2009: Those who committed theft of http://www.religioustravelassociation.com/ replaced content on WRTA's website/domain name with content of their own.
2) Screen shot on Feb 12, 2010: Those who committed theft of http://www.religioustravelassociation.com/ redirected it to WRTA's newly created domain name and website http://www.wrtareligioustravel.com/
3) Screen shot on May 26, 2010: Those who committed theft of http://www.religioustravelassociation.com/ deleted and/or sold WRTA's domain name prior to its natural expiration date of Oct 26, 2010 in order to destroy evidence, cause financial and other harm to WRTA, etc.
Note: Much more information, content, and evidence regarding the above screen shots will be forthcoming in this blog.
What is “Insider Domain Theft”?
Theft of an organization’s domain name or website by a shareholder, employee, or contractor. Insider domain theft is one of the most common forms of domain theft. The World Religious Travel Association was a victim of insider domain theft.
Enrico Schaefer, trial attorney and Internet law expert: "URL theft by a partner or co-owner is perhaps the most common example of domain name theft. Domain names stolen in this fashion account for about 25% of the calls and emails we receive in the domain theft area."